The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE.
As part of the attacks, the threat actors, tracked as UAC-0255, sent emails on March 26 and 27, 2026, posing as CERT-UA to distribute a password-protected ZIP archive
A vulnerability labeled as critical has been found in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery.
This vulnerability is registered as CVE-2026-5346. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
Alleged Breach of Smarteez Exposes Full Production Database for L'Oreal Morocco Including 296 Pharmacies, 361K Sales Records, OAuth Secrets, and Competitive Intelligence Across Four L'Oreal Brands
A vulnerability identified as problematic has been detected in Sage DPW 2025_06_004. This issue affects some unknown processing of the component Login. Performing a manipulation results in observable response discrepancy.
This vulnerability is cataloged as CVE-2025-67807. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in Lakeside SysTrack Agent. This vulnerability affects unknown code. Such manipulation leads to race condition.
This vulnerability is listed as CVE-2026-35099. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in OpenClaw up to 2026.3.21. It has been rated as problematic. This affects an unknown part of the component Path Validation Handler. This manipulation causes improper resolution of path equivalence.
This vulnerability is tracked as CVE-2026-34510. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in TOTOLINK A3600R 5.9c.4959. It has been declared as critical. Affected by this issue is the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. The manipulation of the argument rootSsid results in buffer overflow.
This vulnerability is identified as CVE-2026-31027. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Textpattern up to 4.9.1. It has been classified as critical. Affected by this vulnerability is the function mt_uploadImage of the file rpc/TXP_RPCServer.php of the component XML-RPC Handler. The manipulation of the argument file.name leads to path traversal.
This vulnerability is referenced as CVE-2026-5344. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The vendor confirmed the issue and will provide a fix in the upcoming release.
FulcrumSec Breaches Unique Computing, ReFocus AI, and Gennet AI Exposing 23,000 Insurance Policyholders, $797M in Premiums, Driver Licenses, SSNs, and Proprietary ML Models From a Single Unpatched AWS Account
A vulnerability was found in DDSN Interactive Acora CMS 10.7.1 and classified as problematic. Affected is an unknown function of the file submit_add_user.asp. Executing a manipulation of the argument First Name/Last Name can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-29598. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Devolutions Server up to 2026.1.11 and classified as problematic. This impacts an unknown function of the component Multi-factor Authentication Management API. Performing a manipulation results in missing authorization.
This vulnerability was named CVE-2026-5175. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as problematic, was found in SourceCodester Zoo Management System 1.0. This affects an unknown function. Such manipulation of the argument msg leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-30526. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in Docudepot PDF Reader PDF Viewer App 1.0.34. The impacted element is an unknown function. This manipulation causes improper access controls.
This vulnerability is handled as CVE-2026-30292. It is possible to launch the attack on the local host. There is not any exploit available.